★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-410-dumps.html
Youre going to get the detailed explanation whenever you deal with troubles on your 70-410 study. Actualtests supply you the 70-410 Installing and Configuring Windows Server 2012 key points legibly inside the 70-410 places. All these are tremendously preserving your own expenditures to get acquainted with the Microsoft classes.
2021 Jun 70-410 braindump:
Q281. - (Topic 3)
Your network contains an active directory domain named contoso.com. The domain contains a domain controller named DCS. DCS has a server core installation of windows server 2012. You need to uninstall Active Directory from DCS manually. Which tool should you use?
A. The Remove-WindowsFeature cmdlet
B. the ntdsutil.exe command
C. the dsamain.exe command
D. the Remove-ADComputer cmdlet
Answer: B
Q282. - (Topic 1)
Your network contains a server named Server1 that runs Windows Server 2012
R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: G
Explanation:
Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first.
References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Q283. - (Topic 2)
You have a server named Server1 that runs Windows Server 2012 R2.
A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can enable NTFS disk quotas for volume D.
What should you do first?
A. Install the File Server Resource Manager role service.
B. Format volume D.
C. Run the convert.exe command.
D. Convert the disk to a dynamic disk.
Answer: B
Explanation:
ReFS-formatted disks cannot use NTFS disk quotas, so the drive must be formatted as an NTFS partition
Q284. - (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain
contains three servers named Server1, Server2, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. (Click the Exhibit button.)
You need to ensure that Server2 can be managed remotely by using Server Manager. What should you do?
A. On DC1, run the Enable-PSSessionConfiguration cmdlet.
B. On Server2, run the Add-Computer cmdlet.
C. On Server2 modify the membership of the Remote Management Users group.
D. From Active Directory Users and Computers, add a computer account named Server2, and then restart Server2.
Answer: C
Explanation:
This is a security issue. To be able to access Server2 remotely through Server Manager
the user need to be a member of the Remote Management Users group.
Note:
* Name: BUILTIN\Remote Management Users Description: A Builtin Local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
* Enable-ServerManagerStandardUserRemoting Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager. Syntax: Parameter Set: Default Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-Confirm] [-WhatIf] [ <CommonParameters>] Detailed Description Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager. The cmdlet must be run locally on the server that you are managing by using Server Manager. The cmdlet works by performing the following actions: Adds access rights for specified standard users to the root\cimv2 namespace on the local server (for access to role and feature inventory information). Adds specified standard users to required user groups (Remote Management Users, Event Log Readers, and Performance Log Readers) that allow remote access to event and performance counter logs on the managed server. Changes access rights in the Service Control Manager to allow specified standard users remote access to the status of services on the managed server. Incorrect: Not A: the Enable-PSSessionConfiguration.This is an advanced cmdlet that is designed to be used by system administrators to manage customized session configurations for their
users.
Reference: Enable-ServerManagerStandardUserRemoting
Q285. - (Topic 1)
Your network contains an Active Directory domain named contoso.com.
You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is
verified against a certificate revocation list (CRL). What should you do?
A. Modify the rule for App1.
B. Modify the Trusted Publishers Properties.
C. Create a new certificate rule for App1.
D. Modify the Enforcement Properties.
Answer: B
Latest lab for 70-410:
Q286. - (Topic 3)
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
. Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. . Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. . The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. . The storage must be available if a single disk fails.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From File and Storage Services, create virtual disks by using fixed provisioning.
B. From File and Storage Services, create virtual disks by using thin provisioning.
C. From File and Storage Services, create a storage pool that uses all four disks.
D. From Disk Management, create a new RAID-5 volume that uses all four disks.
E. From Disk Management, create two new mirror volumes that use two disks each.
Answer: A,C
Q287. - (Topic 3)
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, VM4.
You create a LUN on the SAN.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN.
What should you configure?
A. A fixed-size VHDX
B. A dynamically expanding VHDX
C. A fixed-size VHD
D. A pass-through disk
E. A dynamically expanding VHD
Answer: D
Explanation:
You can use physical disks that are directly attached to a virtual machine as a storage option on the management operating system. This allows virtual machines to access storage that is mapped directly to the server running Hyper-V without first configuring the volume. The storage can be either a physical disk which is internal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logical reference to a portion of a storage subsystem). The virtual machine must have exclusive access to the storage, so the storage must be set in an Offline state in Disk Management. The storage is not limited in size, so it can be a multi-terabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following: This type of disk cannot be dynamically expanded. You cannot use differencing disks with them. You cannot take virtual hard disk snapshots. Att: If you are installing an operating system on the physical disk and it is in an Online state before the virtual machine is started, the virtual machine will fail to start. You must store the virtual machine configuration file in an alternate location because the physical disk is used by the operating system installation. For example, locate the configuration file on another internal drive on the server running Hyper-V.
Q288. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You have a virtual machine named VM1. VM1 has a checkpoint.
You need to modify the Checkpoint File Location of VM1.
What should you do first?
A. Copy the checkpoint file.
B. Delete the checkpoint.
C. Shut down VM1.
D. Pause VM1.
Answer: B
Q289. - (Topic 3)
Your network contains two subnets. The subnets are configured as shown in the following table.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
A. Change the default gateway address.
B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable.
C. Change the metric of the 10.10.1.0 route.
D. Set the state of the Teredo interface to disable.
Answer: A
Explanation:
The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2.
In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address.
References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256
Q290. - (Topic 1)
Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.
When the link between Site1 and Site2 fails, users fail to log on to Site2.
You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.
What should you identify?
A. The placement of the global catalog server
B. The placement of the infrastructure master
C. The placement of the domain naming master
D. The placement of the PDC emulator
Answer: D
Explanation:
The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role. The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it. The PDC emulator master processes password changes from client computers and replicates these updates to all domain controllers throughout the domain. At any time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest.